Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230824-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2023 11:51

General

  • Target

    68d6f66f1dbca8a581aece57ea4254a48264eae7299d501188107947ab5d1cd9.exe

  • Size

    4.2MB

  • MD5

    13864c6b8048bc6b99498a0f61d5be58

  • SHA1

    04db785a8b6970dbd89eeeac2663a14fa08dcae9

  • SHA256

    68d6f66f1dbca8a581aece57ea4254a48264eae7299d501188107947ab5d1cd9

  • SHA512

    9f6873f4d84f5cf03444141e669dfe386a05df3e566ac6697a101c47375a581b73ca4047c9e87ab2f76a0241a4bbd352593d03c247773520c62a846370f54faf

  • SSDEEP

    49152:d+jvcz959eYNSKlsNL6CJiHXDOYFQj7jTZaqdwk0c05HGiK+s8KuqGaX0ToIBAUp:odNbJiHi2QjvYqdwkLcHHZJBAUZLL

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 3 TTPs
  • Drops file in System32 directory 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    PID:1212
  • C:\Users\Admin\AppData\Local\Temp\68d6f66f1dbca8a581aece57ea4254a48264eae7299d501188107947ab5d1cd9.exe
    "C:\Users\Admin\AppData\Local\Temp\68d6f66f1dbca8a581aece57ea4254a48264eae7299d501188107947ab5d1cd9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Windows\SysWOW64\sc.exe
        sc delete ChromeElevationService
        3⤵
        • Launches sc.exe
        PID:3088
      • C:\Windows\SysWOW64\sc.exe
        sc delete 360
        3⤵
        • Launches sc.exe
        PID:2068
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /t /im dllhost.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3316
      • C:\Windows\SysWOW64\reg.exe
        REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\360 /f
        3⤵
          PID:2252
        • C:\Windows\SysWOW64\reg.exe
          REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\360 /f
          3⤵
            PID:376
          • C:\Windows\SysWOW64\reg.exe
            REG DELETE HKEY_LOCAL_MACHINE\SYSTEM\ControlSet\Services\360 /f
            3⤵
              PID:1832
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://zcmao.lanzouh.com/iuwrl15yeryb
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:5052
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc044646f8,0x7ffc04464708,0x7ffc04464718
              3⤵
                PID:3412
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1100
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
                3⤵
                  PID:1296
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3004 /prefetch:8
                  3⤵
                    PID:2768
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:1
                    3⤵
                      PID:1112
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
                      3⤵
                        PID:2372
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                        3⤵
                          PID:1660
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                          3⤵
                            PID:2084
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:8
                            3⤵
                              PID:3560
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3328
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:1
                              3⤵
                                PID:2604
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:1
                                3⤵
                                  PID:3540
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,16735715733418539707,12635418286231416825,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:2
                                  3⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:368
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3036
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3040

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\5d08b573-199f-4e34-8ee5-5b3c92ab75fb.tmp

                                  Filesize

                                  11KB

                                  MD5

                                  47f255fd210505bb62b444720f4f5de2

                                  SHA1

                                  e0e72a0497843c6e0cb044bdf2877bb891235c2c

                                  SHA256

                                  0ec11d09b89e70229b1453cab42ebb130103b6ded3cb0f5283d62ca10a472789

                                  SHA512

                                  18fb9d879e7d4df07312ce79facb60c47e943a7cc4dca14d670c79b86fbacdc5bc9cf113a53a96ee9012c6ee1634f31fb0487aaec0e0b2b6d0f573d1a51f526f

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  3590c7788f1f36717cbd298007259a6f

                                  SHA1

                                  9e9a602016435a1d642e18a54d8d6589f938a5bb

                                  SHA256

                                  09a08de2fcd19e304c3b8f6e04f5e4da257a3f18759827be4e9c6af862412174

                                  SHA512

                                  07df3ee7e2d4a313c996c6b8451450556a75e5ac8e4d10595f255164fdd25d6bc596ad579d90f6496c78a15a3c6fc349d748dd7c5f4b2b51d330c52577e2988a

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  120B

                                  MD5

                                  86d05fc18e3d0013e6d729676e9050ea

                                  SHA1

                                  165ef09332d24ee06b7f43715577154dcff17449

                                  SHA256

                                  21d92c3e8b293e85e7f88150780adf26c9b58bd7a95593f0dc61b71138d2e686

                                  SHA512

                                  d5bc888eca44bbc8157bdc52e142533d99b4b8768791f3ae26d62e3f857001fa72a827813025d9510f76aa424eed1029902eef54af7e8c9dd04a682972beb1e2

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  111B

                                  MD5

                                  807419ca9a4734feaf8d8563a003b048

                                  SHA1

                                  a723c7d60a65886ffa068711f1e900ccc85922a6

                                  SHA256

                                  aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                  SHA512

                                  f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  182B

                                  MD5

                                  2a34e3b0cb9618524ad550fde8717ef6

                                  SHA1

                                  a3868e26390a7448be6f2f9507bb5012f604517e

                                  SHA256

                                  869ef21fe529217d02556f8e6a5b3387a3d8c785809d7d52fecc7c8cf1795dbb

                                  SHA512

                                  7fa1168b89b26751123d36e1456e102b77a5532e036a6ec09a1186ab9c6a21f8a3cbbbf6a3fa3fa730af59f2a8eb265a4a5dcb5547a3e56d4d2ea86257ddadcb

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  105303f06a0c38b534f598f6f1dbb5f6

                                  SHA1

                                  f8bbdad67c0cd79c621caa1ca9611d5493c5910f

                                  SHA256

                                  80ebc465f1731f7efa7d868bd34c2b474a2f79717b935dca716825702770fb43

                                  SHA512

                                  cbb3cfbf886648972f1f7fb4eacb33d523386852d629513afc398f3e73f7edc7489213075356207059a857f161f5e0abf1d43cb4fdbcfd45c648cc6424f804e5

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  258b17ac5c67753d52fc554bde81478c

                                  SHA1

                                  98c77e35f66260b47ec2e255b1bc2f2cb3d1e09c

                                  SHA256

                                  f05dd6668c04e0eb1cc8522c8434f6674043e9ffab074358a412255c5114671c

                                  SHA512

                                  e1ed17d1e971a32d148734bbdf0246ad0859e75d839b08b4018d0bb94299dab0e6a8553c4f62ab966be8da0c9186b6be61b58344382ece156f22cb517c0dbc5e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                  Filesize

                                  24KB

                                  MD5

                                  a128973ca2ca245299ef7e60156b4ef8

                                  SHA1

                                  d39a437204591bbff98d673e6d1c4f869683ebcc

                                  SHA256

                                  5c6e1f3c7213460c24dc670521adbe32ec76df5e3facc0a7b92a3fa9e340b302

                                  SHA512

                                  bbbdbe2fae61c2a27b4aadfbda2efae2675156dcea6edb8b45fbe83f397f8a1f50d694d8bcd1f53939a277722baf102f3f80caffadfcf0ca80d7408d77d8c490

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  fd68dc1ababe91cbfd616758538810ff

                                  SHA1

                                  4c2f57f7aab9c7b2ed5a69bc5074147607323b6a

                                  SHA256

                                  66286299b6c96534454a1772e67ba666f83002b2b3f1e03eb391e3837dbbf6d9

                                  SHA512

                                  aa2fc259589c7209ac6ca6ee06695d485c73a5a3f72907e91073952bef537f45c14ca0e13ba21b3779c6f920b81ccef688d76a2b45f558c67cf97b9bde07a0e2

                                • C:\Users\Admin\AppData\Local\Temp\·ÀÉÁÍË.bat

                                  Filesize

                                  467B

                                  MD5

                                  f3ff51b7aa0e4e3044d31e57cd316f38

                                  SHA1

                                  de03393bddc8e3cc225766e988ec732a86be9674

                                  SHA256

                                  ea04a3da71be52f51404cabfa8eeefd12223d95f92c1f2a376ee25ee7323181b

                                  SHA512

                                  c582a9767528a4dc860ba322529b4d2b77aa8a272bb95053ace7fba671aad0aefc9aa7c7fd5682b8f875da58a4b6142ec708cb4bc40345645cc661c12ab32f21

                                • memory/1556-1-0x0000000002820000-0x000000000282A000-memory.dmp

                                  Filesize

                                  40KB